Logo
Search
Home
Archive
Tags
Login
Sign Up
The Cyber Times Newsletter

The Cyber Times

Curation of insights from my learnings about cybersecurity
by Kartheek

Articles

Educational

How Your API Data Gets Stolen

Oct 31, 2025

•

4 min read

How Your API Data Gets Stolen

Hidden Doors in Your API

Kartheek T
Kartheek T

Case study

NotPetya: The malware that stopped the world

Oct 11, 2025

•

4 min read

NotPetya: The malware that stopped the world

From Ukraine to Global Chaos

Kartheek T
Kartheek T

Case study

Stuxnet: Code as a Weapon

Oct 2, 2025

•

7 min read

Stuxnet: Code as a Weapon

The worm that attacked Iran's Natanz nuclear facility

Kartheek T
Kartheek T

Educational

The Hidden Danger of IDN Homograph Attacks

Sep 24, 2025

•

3 min read

The Hidden Danger of IDN Homograph Attacks

Why ‘аmazon.com’ isn’t really 'amazon.com'?

Kartheek T
Kartheek T

Educational

How to Hide Passwords Inside Images?

Sep 14, 2025

•

3 min read

How to Hide Passwords Inside Images?

Protect Your Secrets the Stealthy Way

Kartheek T
Kartheek T

General

Cyberwarfare — Non kinetic Warfare

Aug 27, 2025

•

3 min read

Cyberwarfare — Non kinetic Warfare

The rise of non kinetic warfare

Kartheek T
Kartheek T

The Cyber Times


© 2025 The Cyber Times Newsletter.

Report abuse

Privacy policy

Terms of use

Powered by beehiiv